Mostrando 2 resultados de: 2
Filtros aplicados
Publisher
Electronics (Switzerland)(1)
Proceedings - 2020 IEEE Latin-American Conference on Communications, LATINCOM 2020(1)
An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusReview: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Conference ObjectAbstract: As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any buPalabras claves:Artificial Intelligence, CYBERSECURITY, Deep Neural Networks, Intrusion Detection Systems, Machine learningAutores:Mayra MacAs, Wu C.Fuentes:scopus